Get Free SMS Alert

MY OTHER BLOG

Followers

STEALTH HACKER

Facebook Badge

About Me

STEALTH_HACKER

Am a 18 years guy doing CEH & CHFI. I Like To Share My Ideas & Views About HACKING Because i Think That Everyone Should Know About It
So That They Can Save Them Self From CRACKERS.
"NO ONE CAN SAY AM A HACKER,
WE ARE THE HACKERS"
HACKING IS NOT CRIME IT's OWN PASSION. BUT ONE CAN USE OF IT FOR GOOD PURPOSE ALSO.

Majority of us now use smartphones and we do store our personal as well as some confidential data in it. A lost or stolen phone can be really painful if the owner had any confidential data stored in it. All you need in such situation is a way to delete all those files so that no one can misuse the information on the phone.Here the F-Secure anti theft system comes in the picture. It is a freemobilesoftware developed by one of the leading company in the field of digitalsecurity.

Each time after turning on the PC people generally open the same set of applications. For example after turning on my PC I normally open my Firefox browser, Yahoo Messenger and Google Talk and play my same old playlist on Winamp.Time required to open all this programs can be reduced by using this small app – Lacuna Launcher.

Hiren’s BootCD is an ultimate solution to almost all your computer problems. It comes loaded with hell lot of tools. Each of them is powerful and can be really very helpful if used with caution. You can solve nearly all your PC problems like virus infection, hdd failure, data recovery, Hard disk partitioning, password recovery using this CD.

Before you read the following article, see this warning quoted from the developer’s site.

Read before download: Cheat engine is for educational purposes only. Before you attach Cheat Engine to a process, please make sure that you are not violating the EULA/TOS of the specific game/application. cheatengine.org does not condone the illegal use of Cheat Engine

There is a hidden feature in Windows and not many users know anything about it. You can setup a banner with a message in it. Each time your Windows boots up the same banner will pop up. The message can be anything from a welcome message to some important information. You can use it in the way you want. Follow the simple steps given below to setup a banner for your Windows system:

Having read the title of this post you may be wondering if it’s really possible. Yeah! It is possible. As the word suggests, it’s a calculator with a safe which is capable of storing and keeping your files and folders safe. The safe calculator looks just like the default calculator in Windows and in fact it can even perform calculations just like any other calculator. When you start Safe Calculator it will look just like the below pic.

A new year has begun and perhaps you have decided to perform a system upgrade or get rid of your old computer system and purchase a new one. But before you sell or donate your old computer, it is very much necessary to completely erase your Hard Disk Drive. Yes, every one of us are aware of this fact and so, we delete the contents of the hard disk either by using the DELETE key on our keyboard or by Formatting the hard disk.

If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.

Internet Protocol (IP) addresses are usually of two types:Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.

As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.

An IP address (Internet Protocol address) is a unique address that certain electronic devices currently use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address.

Twitter is powerful and simple indeed. But then developers were not stopping on creating and obviously developing new applications to make it even stronger. TweetMyPC is a freeware application which enables you to utilize Twitteras a way of sending commands to your PC remotely.

This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:Get DOS prompt and type:

Overview

To crack the WEP key for an access point, we need to gather lots of initialization vectors (IVs). Normal network traffic does not typically generate these IVs very quickly. Theoretically, if you are patient, you can gather sufficient IVs to crack the WEP key by simply listening to the network traffic and saving them. Since none of us are patient, we use a technique called injection to speed up the process . Injection involves having the access point(AP) resend selected packetsover and over very rapidly. This allows us to capture a large number of IVs in a short period of time.

Firefox is the top most world widely used web browser. Because it is handy and have lots of features though its add-on and extension. Sometimes we download files using Firefox and on the same time we need to go for some work. So until we come back the computer waste the energy. In this situation we can use Firefox Auto shutdown thecomputer when downloads are completed and helps us to save electric power.

Windows 7 is predominantly the best OS ever in the history of Microsoft. But, do you know that it has a GodMode within it ?There is a hidden “GodMode” feature that lets a user access all of the operating system’s control panel features from within a single folder.

URL Shortening is a trend in today’s social media and web surfing. Big giants such as Google and YouTube have their own URL shorteners, too. It’s not just because the URL

shortening is a trend of the present, but also it’s important for tiny conversations like twitter or facebook status.

The trend, URL Shortening, was founded by Tinyurl.com at first and spread widely by twitter. Because you’re limited by how many characters you can use in your conversation, you need everything Short but right. That’s why URL Shortening is important and popular at the same time.

Tinyurl.com has an option to preview the shortened link before you visit the site. If you include a word, preview, before the domain tinyurl.com, you will see where the link goes. But what about other shorteners?

Well, you can easily check the link before you have a go to any shortened URL by this firefox plugin. But sometimes you just don’t want to restart your firefox and want a quicker way to do this.

Phishing is usually considered to be most effective when it’s combined with social engineering, the hacker term for human manipulation. One way phishing can be combined with social engineering is through the exploitation of redirect vulnerabilities. This article will demonstrate to you what redirect vulnerabilities are, how to spot them, and how they can be exploited.

So first things first. What is aredirect vulnerability? A redirectvulnerability is when a webpage uses a script toredirect you to somewhere (usually another page on the website), but they write that script in such a way that it allows a hacker to manipulate it to send you to an external page instead of an internal one. There are many types of redirect vulnerabilities, but we’ll be looking at the most basic type here for now. Example: let’s say we’re logging in to webpage that has this url:

Twittermuch like Facebook is popular social networking site and these sites users are targeted with phishing scams luring them to reveal their username and passwords.Here are some security tips for twitter users for safe tweeting.

Tips to secure twitter account..

1.Use strong and Unique password : Use the password for your twitter account as a combination of characters, symbols and numbers. Never use same password for different websites and email accounts, use unique password for every website.

1) Sneakers (1992)Martin Bishop is the head of a group of experts who specialise in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn’t work for the Government after all…

How to unblock websites? These days, Internet filtering and controlled access is the new trend. More business owners are implementing filters within their companies with the purpose of blocking websites. Their intention is understandable but, on the other side, people love freedom and sometimes they feel mistreated. However, here are some things you can do that will help you bypass filters and unblock websites.1. Use web proxies.Many free online services allow you to access blocked websites through a proxy server. A proxy server is an intermediary between the user and the server where the request was send. Here is a list with the most known resources of web proxies: Proxy.org, HideMyAss.com, Kortaz.com, KProxy.com and Anonymouse.org

U need are a few utilities like angry ip scanner and a Mac Address changer like Gentle Mac Pro. What you got to do fist is scan your ip range and see who all are online then get their mac address. Then use Gentle Mac Pro and change your ip and mac address to some one who is logged on and Bingo you surfing the net for Free. Here are the Link'z

Hello Guys I am Going To Explain The Tutorial On HackingBy Using Telnet Service Of Windows Hacking.NOTE: Will only work if the person you are trying to hack is using a Windows Xp operating system.You need to know victims computers username and password. Have to be instant messaging victim

Hello Guys Today i am going to Explain the very basic things that you must know If you Want to become a Hacker or you are a Hacker (whatever be). In thisTutorialI will Explain you "Locations where the passwords are Saved in Windows Operating System". Various readers of my blog asked me about where the passwords really stored in windows. So today I am going to Explain this where the password really stores...So Read on...

ThisTutorialis Program Oriented Means Different Locations for DifferentSoftwaresand window components...

Increase BROADBAND speed in WinXP *Should work for 56k also*1. make sure your logged on as actually "Administrator". do not log on with any account that just has administrator privileges.2. start - run - type gpedit.msc (not available in home version)3. expand the "local computer policy" branch4. expand the "administrative templates" branch5. expand the "network branch"